An exploration of Web 2.0 hacking methods, this book discusses how to enhance next-generation security controls for better application security. It covers old vulnerabilities and threat vectors such as phishing, cross-site scripting (XSS), cross-site request forgery (CSRF) exploitation, viruses and malware, and denial of service. It introduces Web 2.0 scanning and vulnerability detection methods; Ajax and Flash hacking methods; SOAP, REST, and XML-RPC hacking; RSS/Atom feed attacks; fuzzing and code review methodologies and tools, and puts these in the content of Web 2.0 and mobile applications. The book includes exercises and suggestions for further reading.
Painos loppuTuote on tilapäisesti loppunut ja sen saatavuus on epävarma. Tuote on tilapäisesti loppunut ja sen saatavuus on epävarma. Seuraa saatavuutta.